shadow-number

Fail

Audited by Snyk on Feb 26, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). This skill requires the agent to retrieve temporary phone numbers and OTP codes from the API and then place those values verbatim into website forms/commands (e.g., enter +{phoneNumber} and data.sms.code), so the LLM would handle and emit secret values directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This skill explicitly offloads phone verification and intercepts SMS OTPs to a third‑party API (and triggers automatic crypto payments), intentionally enabling bypass of authentication, credential/OTP capture and account-creation abuse.

MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).

  • Direct money access detected (high risk: 1.00). The skill explicitly performs payments: it "handles x402 crypto payment automatically" and states "your agent wallet will automatically pay ~$0.10 USDC on Base when the server returns HTTP 402." That indicates the skill triggers on-chain crypto payment from an agent-controlled wallet (signing/sending USDC on Base) as part of the buy flow. This is a specific crypto/blockchain payment capability, which qualifies as Direct Financial Execution.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 26, 2026, 04:17 PM